STUDY AND COMPARISON OF VARIOUS IMAGE EDGEDETECTIONTECHNIQUES
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 5
Abstract
Edge detection is one of the most commonly used operations in image analysis, andthere are probably more algorithms in the literature for enhancing and detecting edgesthan any other single subject. The reason for this is that edges form the outline of anobject. An edge is the boundary between an object and the background, and indicatesthe boundary between overlapping objects. This means that if the edges in an image canbe identified accurately, all of the objects can be located and basic properties such asarea, perimeter, and shape can be measured. Since computer vision involves theidentification and classification of objects in an image, edge detections is an essentialtool. In this paper, we have compared several techniques for edge detection in imageprocessing.
Authors and Affiliations
Nidhi Chandrakar and Mr. Devanand Bhonsle
Psychological aspects of male and female investors towards money matters
Financial sector is the backbone of any healthy nation. In finance theories it is assumed that people behave rationally and predictably when it is economic/financial matter. In several recent studies it is found that m...
Power Quality enhancement in MICROGRID (Islanding Mode) by Using ND - MLI DSTATCOM
Microgrids are systems with clusters of micro generators, which are installed for distributed power generation. When interfaced to the utility grid, microgrids are exposed to common utility power-quality disturbances....
Secure File Transmission Scheme Based on Hybrid Encryption Technique
To enhance the security level of data transmission in Open Network, a hybrid encryption Technique based on AES, RSA and MD5 is proposed. The mechanism makes full use of advantage of AES RSA, MD5 because encryption spee...
A NEW SYMMETRICAL ENCRYPTION ALGORITHM WITH HIGH SECURITYAND DATA RATE FOR WLAN
The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,CAST, UMARAM and RC6 have been used to prevent the outside attacks to eavesdrop or prevent the data to...
MAXIMIZATION OF RETURN ON INVESTMENT (ROI) BY HYPER PRODUCTIVE SOFTWARE DEVELOPMENT THROUGH SCRUM
The Research paper concentrated on the Scrum and focused on how to maximize the return on investment while developing the software especially in the IT (Information Technology) industry of Pakistan. The purpose of the...